Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 03:23
Behavioral task
behavioral1
Sample
92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe
Resource
win7-20240903-en
General
-
Target
92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe
-
Size
27KB
-
MD5
2e7cccdef764a82cfff05d82a09c4c20
-
SHA1
fd66faac576168538b76f2827f2427f88a023210
-
SHA256
92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18
-
SHA512
33bb8cd52307fd53fe8b98a78ddee2b03715c50e9eb3ae5717d1333cc3871f894c15e865b18666cb413a4a00ec5d0b71a06aea94ffb473c21d062f0618a67370
-
SSDEEP
384:MLy6lnw3m4AfJFkDMo9ePkimCM4AQk93vmhm7UMKmIEecKdbXTzm9bVhcaHt4/re:KyyBPKH4A/vMHTi9bDH
Malware Config
Extracted
njrat
v4.0
BRASIL
chromedata.accesscam.org:9098
Desktop
-
reg_key
Desktop
-
splitter
|-F-|
Signatures
-
Njrat family
-
Drops startup file 3 IoCs
Processes:
92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Desktop.exe 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Desktop.exe 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Desktop.lnk 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exedescription pid process Token: SeDebugPrivilege 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: 33 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: SeIncBasePriorityPrivilege 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: 33 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: SeIncBasePriorityPrivilege 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: 33 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: SeIncBasePriorityPrivilege 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: 33 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: SeIncBasePriorityPrivilege 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: 33 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: SeIncBasePriorityPrivilege 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: 33 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: SeIncBasePriorityPrivilege 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: 33 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: SeIncBasePriorityPrivilege 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: 33 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: SeIncBasePriorityPrivilege 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: 33 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: SeIncBasePriorityPrivilege 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: 33 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: SeIncBasePriorityPrivilege 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: 33 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: SeIncBasePriorityPrivilege 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: 33 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: SeIncBasePriorityPrivilege 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: 33 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: SeIncBasePriorityPrivilege 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: 33 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: SeIncBasePriorityPrivilege 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: 33 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: SeIncBasePriorityPrivilege 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: 33 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: SeIncBasePriorityPrivilege 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: 33 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe Token: SeIncBasePriorityPrivilege 2420 92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe"C:\Users\Admin\AppData\Local\Temp\92b846ca259d512fbfd4674af6ac75ef75baa25a06a75edc0d4ab36707a32c18.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2420